sumi.news
Search
Following
Sign in
← Back to news
Programming
RSS Feed
sumi.news
Programming
Follow
Latest
Thu Mar 26
The Island That Hatched Extinction
2w
H
What iOS Lockdown mode actually does
2w
L
DOOM, played over cURL
2w
L
When AI Becomes the Voice You Think With
2w
H
Architecture for Compliance Scaling Microservices with DDD for High Volume Global Enterprise Systems
2w
H
Meet the Writer: Hacker Noon's Contributor Pavel Manovich, Founder & Product Builder
2w
H
How to Evaluate an AI Persona: Beyond Benchmarks and Vibes
2w
H
Resident Evil Star Milla Jovovich Shipped an AI Memory System. Devs Shredded Its Benchmarks
2w
H
iOS Event Handling Evolution: UIKit Responder Chain and SwiftUI Gestures
2w
H
Alone With the Unknown in Borneo
2w
H
The quest for the perfect 2D sprite pipeline
2w
L
How to build a git diff driver
2w
L
IrDA
2w
L
BASIS Successfully Completes Private Testing as Base58 Labs Prepares for Full-Scale Staking Market
2w
H
The TechBeat: Librarians vs "Data Cartels": What's Going On? (4/12/2026)
2w
H
When a Flower Becomes a Predator
2w
H
The End of Eleventy
2w
L
Why I'm Building a Database Engine in C#
2w
L
How Gran Turismo's Creator Snuck a Sim Into a Mario Kart Rival to Persuade Sony Execs
2w
L
Designing Fintech Across Fifteen Countries
2w
H
Serbia Builds While the West Borrows
2w
H
Surely there must be a way to make container secrets less dangerous?
2w
L
The Structural Risk Behind Ukrainian-Rooted Unicorns
2w
H
What Really Happens When You Stop Posting on X for 2 Months
2w
H
Productive procrastination
2w
L
Optimization of 32-bit Unsigned Division by Constants on 64-bit Targets
2w
L
Astounding Stories of Super-Science, April, 2004 - Table of Links
2w
H
No one owes you supply-chain security
2w
L
Brocards for vulnerability triage
2w
L
A Drop of Death in a Madman’s Hand
2w
H
Writing design docs
2w
L
Beneath the Cone
2w
H
A Victorian Bug Story
2w
H
Bringing Rust to the Pixel Baseband
2w
L
CLI vs. MCP: Why Claude Code's Ecosystem Is Pivoting (And the 10 Tools Leading It)
2w
H
The Trap of "Vibe Coding" and the Rise of Engineering as a Service
2w
H
fakecloud – Free, open-source AWS emulator (LocalStack alternative)
2w
L
Replacing Lenovo’s WWAN Unlock Blob with a 100-Line Bash Script
2w
L
Investigating Split Locks on x86-64
2w
L
This Suicide Prevention Algorithm for Military Veterans Appears to be Favoring This Specific Group
2w
H
Why “EVM Hacking” Became a Bigger Story Than EVM Security
2w
H
AI Coding: What Happens When Your Code Outpaces the Systems Around It and What to Do About It
2w
H
High-Level Rust: Getting 80% of the Benefits with 20% of the Pain
2w
L
A set of Saturday stable kernel updates
2w
W
EU's EES fingerprint and photo travel rules come into force
2w
L
Git fixup is magic (and Magit is too)
2w
L
Debunking Classical Pseudo-Paradoxes of Logic
2w
H
Using Wireshark to reverse-engineer a USB device
2w
L
Analyzing KDE Project Health With git
2w
L
How passive radar works
2w
L
More →